IOC Report
http://promogiveawayus.com

loading gif

Files

File Path
Type
Category
Malicious
C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\2683957b-77d2-40f8-a1ae-39b4ab1e3560.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\2ecbf2cc-8b65-4ad5-8855-8b8fd400d880.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\5540380a-80f8-44f7-b0d7-d5d99ee3c731.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\6bfe6688-cae4-4f3a-830b-e2f12322df0e.tmp
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\992d2d70-492f-4e0f-a6be-fa812400084e.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\2e6a9517-9ce1-4e7a-a518-62f3cc199e05.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\40db85c3-83e3-439b-ad32-1efb235b43c0.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\4cde9abc-eb55-4f4e-b438-146aec54245f.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\50de740a-7357-46fb-82d6-5598c98f1086.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\66056bbf-5e06-40ff-b55e-70d3deb948bf.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\80b74831-8396-4da5-94a5-15225c455efe.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\9bdf7603-bf14-481d-8c0a-4914c77d46d4.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata\computed_hashes.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\000003.log
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network Persistent State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Preferences (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences (copy)
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\01684835-66c7-40ce-bbf5-cac2f7616f41.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Network Persistent State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\159745c5-262b-4053-9dfe-b1bbabfc6b9a.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network Persistent State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\b6da48e4-6a9b-4b1e-81de-42a23b83e1b1.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\e69a6136-2479-476a-b0ab-5516ba9742fb.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\e7c7e6a5-c53c-440e-9dbe-8dfc2b0c3d8c.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Module Info Cache (copy)
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\c2eedbc2-af48-4cbb-86d7-493b97cfaf3a.tmp
SysEx File -
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\cf052b68-502c-461f-be72-432442a59bef.tmp
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\f697e70d-3b94-4641-8755-47357899dbf3.tmp
ASCII text, with very long lines, with no line terminators
modified
C:\Users\user\AppData\Local\Google\Chrome\User Data\ff6ed9a2-c3e2-4000-b7fe-5d752232d45e.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_platform_specific\x86_64\pnacl_public_pnacl_json
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_platform_specific\x86_64\pnacl_public_x86_64_crtbegin_for_eh_o
ELF 64-bit LSB relocatable, x86-64, version 1 (SYSV), not stripped
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_platform_specific\x86_64\pnacl_public_x86_64_crtbegin_o
ELF 64-bit LSB relocatable, x86-64, version 1 (SYSV), not stripped
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_platform_specific\x86_64\pnacl_public_x86_64_crtend_o
ELF 64-bit LSB relocatable, x86-64, version 1 (SYSV), not stripped
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_platform_specific\x86_64\pnacl_public_x86_64_ld_nexe
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=7511538a3a6a0b862c772eace49075ed1bbe2377, stripped
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_platform_specific\x86_64\pnacl_public_x86_64_libcrt_platform_a
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_platform_specific\x86_64\pnacl_public_x86_64_libgcc_a
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_platform_specific\x86_64\pnacl_public_x86_64_libpnacl_irt_shim_a
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_platform_specific\x86_64\pnacl_public_x86_64_libpnacl_irt_shim_dummy_a
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_platform_specific\x86_64\pnacl_public_x86_64_pnacl_llc_nexe
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=309d6d3d463e6b1b0690f39eb226b1e4c469b2ce, stripped
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\_platform_specific\x86_64\pnacl_public_x86_64_pnacl_sz_nexe
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=4b15de4ab227d5e46213978b8518d53c53ce1db9, stripped
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1944_1712713930\manifest.json
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\cdb0ecc1-d2a8-4afa-a9f7-2b205f6addb2.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\e479d75f-fdb4-4a3b-9617-188efbba6d38.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\bg\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\ca\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\cs\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\da\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\de\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\el\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\en\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\en_GB\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\es\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\es_419\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\et\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\fi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\fil\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\fr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\hi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\hr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\hu\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\id\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\it\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\ja\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\ko\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\lt\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\lv\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\nb\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\nl\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\pl\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\pt_BR\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\pt_PT\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\ro\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\ru\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\sk\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\sl\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\sr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\sv\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\th\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\tr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\uk\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\vi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\zh_CN\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_locales\zh_TW\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\craw_background.js
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\craw_window.js
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\css\craw_window.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\html\craw_window.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\images\flapper.gif
GIF image data, version 89a, 30 x 30
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\images\icon_128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\images\icon_16.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\images\topbar_floating_button.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\images\topbar_floating_button_close.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\images\topbar_floating_button_hover.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\images\topbar_floating_button_maximize.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\images\topbar_floating_button_pressed.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\CRX_INSTALL\manifest.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir1944_264804577\cdb0ecc1-d2a8-4afa-a9f7-2b205f6addb2.tmp
Google Chrome extension, version 3
dropped
There are 102 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --enable-automation "http://promogiveawayus.com
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1520,6848685235432065,1421123194293115861,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1948 /prefetch:8

URLs

Name
IP
Malicious
http://promogiveawayus.com
malicious
http://promogiveawayus.com/
104.21.83.215
malicious
https://promogiveawayus.com/favicon.ico
104.21.83.215
malicious
https://promogiveawayus.com/
malicious
https://dns.google
unknown
https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
unknown
https://www.google.com/intl/en-US/chrome/blank.html
unknown
https://ogs.google.com
unknown
https://www.google.com/images/cleardot.gif
unknown
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=85.0.4183.121&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1&x=id%3Dpkedcjkdefgpdelpbcmbmeomcjbeemfm%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
216.58.215.238
https://a.nel.cloudflare.com/report/v3?s=p%2FKS4PWLimB3gEIXExotDrhbF2QbO23nDzhYmGaxZIFvCy8pmvp017RtJ7haHK3FiuCRJmc6VHrDVsX3t4c14RibUgubyxsWl%2F2QcV%2BwCsUnQZPPdqVwAN5QiWht4PIXf6GU36K7
35.190.80.1
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
142.250.203.109
https://payments.google.com/payments/v4/js/integrator.js
unknown
https://chromium.googlesource.com/a/native_client/pnacl-llvm.git
unknown
https://sandbox.google.com/payments/v4/js/integrator.js
unknown
https://www.google.com/images/x2.gif
unknown
https://accounts.google.com/MergeSession
unknown
http://llvm.org/):
unknown
https://www.google.com
unknown
https://www.google.com/images/dot2.gif
unknown
https://code.google.com/p/nativeclient/issues/entry%s:
unknown
https://code.google.com/p/nativeclient/issues/entry
unknown
https://accounts.google.com
unknown
https://clients2.googleusercontent.com
unknown
https://apis.google.com
unknown
https://www.google.com/accounts/OAuthLogin?issueuberauth=1
unknown
https://a.nel.cloudflare.com/report/v3?s=UjPkQUBIivNit0QwC8H9VLsrRxeNaCwp8x1CaL%2BL0Blpt73kKQpDfayZ%2Fr3MtuyGbCFpEvfaEtpITSZArqe7Y8HZwMYExHbTQ%2BfvuHXRpLNStPc3SriHfAjByjeqUblgh9KZD0be
35.190.80.1
https://www.google.com/
unknown
https://promogiveawayus.com/
104.21.83.215
https://www-googleapis-staging.sandbox.google.com
unknown
https://chromium.googlesource.com/a/native_client/pnacl-clang.git
unknown
https://clients2.google.com
unknown
https://clients2.google.com/service/update2/crx
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
a.nel.cloudflare.com
35.190.80.1
accounts.google.com
142.250.203.109
promogiveawayus.com
104.21.83.215
clients.l.google.com
216.58.215.238
clients2.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown
239.255.255.250
unknown
Reserved
216.58.215.238
clients.l.google.com
United States
104.21.83.215
promogiveawayus.com
United States
35.190.80.1
a.nel.cloudflare.com
United States
127.0.0.1
unknown
unknown
142.250.203.109
accounts.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gfdkimpbcpahaombhbimeihdjnejgicl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mfehgcgbbipciphmccgaenjidiccnmng
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
0
S-1-5-21-3853321935-2125563209-4053062332-1002
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gfdkimpbcpahaombhbimeihdjnejgicl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
pkedcjkdefgpdelpbcmbmeomcjbeemfm
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
module_blacklist_cache_md5_digest
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_username
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2615D713000
heap
page read and write
26162721000
heap
page read and write
1F06D880000
heap
page read and write
C19C07F000
stack
page read and write
2883E9B0000
heap
page read and write
17CF8059000
heap
page read and write
19C48F52000
heap
page read and write
19C48F74000
heap
page read and write
19C48FB8000
heap
page read and write
19C49402000
heap
page read and write
1A34F375000
heap
page read and write
261625C0000
trusted library allocation
page read and write
19C486F3000
heap
page read and write
1F27FDE000
stack
page read and write
19C48F86000
heap
page read and write
2615D759000
heap
page read and write
FB71FFD000
stack
page read and write
1A34F375000
heap
page read and write
261626E3000
heap
page read and write
17CF7FA0000
trusted library allocation
page read and write
2615D718000
heap
page read and write
25AD94A0000
heap
page read and write
823257F000
stack
page read and write
19C48FAB000
heap
page read and write
FB7172B000
stack
page read and write
19C48F86000
heap
page read and write
25ADA340000
trusted library allocation
page read and write
FB71B7B000
stack
page read and write
2615CEAE000
heap
page read and write
2616271C000
heap
page read and write
C19BAF7000
stack
page read and write
25AD9302000
heap
page read and write
261626F1000
heap
page read and write
9DBB47E000
stack
page read and write
2615CE9E000
heap
page read and write
2615D79A000
heap
page read and write
17CF8064000
heap
page read and write
19C48F7C000
heap
page read and write
1A34F35E000
heap
page read and write
26162350000
trusted library allocation
page read and write
19C48F97000
heap
page read and write
2615CE7A000
heap
page read and write
19C49402000
heap
page read and write
1F06D841000
heap
page read and write
19C485E0000
remote allocation
page read and write
25AD9240000
trusted library allocation
page read and write
19C483B0000
heap
page read and write
1F06D800000
heap
page read and write
19C48F1B000
heap
page read and write
2615DC00000
trusted library allocation
page read and write
19C486C1000
heap
page read and write
2883F402000
trusted library allocation
page read and write
17A8FE40000
heap
page read and write
2615E2C0000
trusted library allocation
page read and write
19C48FAA000
heap
page read and write
17A90113000
heap
page read and write
2FF17A000
stack
page read and write
2615D718000
heap
page read and write
261622F0000
trusted library allocation
page read and write
17A90070000
heap
page read and write
1A34F300000
heap
page read and write
261625C0000
trusted library allocation
page read and write
261625B0000
trusted library allocation
page read and write
1A34F352000
heap
page read and write
261626FB000
heap
page read and write
19C4865C000
heap
page read and write
25ADA2E0000
trusted library allocation
page read and write
2615CE3C000
heap
page read and write
2615CE56000
heap
page read and write
17CF806E000
heap
page read and write
2615D615000
heap
page read and write
C19BFFF000
stack
page read and write
17CF805C000
heap
page read and write
2615D758000
heap
page read and write
1A34F371000
heap
page read and write
7909E7B000
stack
page read and write
26162612000
heap
page read and write
17CF8802000
trusted library allocation
page read and write
1A34F35E000
heap
page read and write
1F286FF000
stack
page read and write
25AD9319000
heap
page read and write
25AD9302000
heap
page read and write
25AD92B0000
heap
page read and write
17A90000000
heap
page read and write
261624A0000
trusted library allocation
page read and write
26162471000
trusted library allocation
page read and write
26162717000
heap
page read and write
26162705000
heap
page read and write
19C48F99000
heap
page read and write
25AD92B8000
heap
page read and write
19C485E0000
remote allocation
page read and write
2FEF7F000
unkown
page read and write
2883EC52000
heap
page read and write
17A90102000
heap
page read and write
7909FFE000
stack
page read and write
25AD9569000
heap
page read and write
1A34F330000
heap
page read and write
19C48420000
heap
page read and write
17A90802000
trusted library allocation
page read and write
19C48F76000
heap
page read and write
19C48F8C000
heap
page read and write
1A34F356000
heap
page read and write
823227E000
stack
page read and write
261626A2000
heap
page read and write
2616247E000
trusted library allocation
page read and write
19C486F7000
heap
page read and write
2FEBF9000
stack
page read and write
26162494000
trusted library allocation
page read and write
261622E0000
trusted library allocation
page read and write
FB71CFF000
stack
page read and write
1F285F7000
stack
page read and write
2883EC02000
heap
page read and write
17CF7EA0000
heap
page read and write
1F06D900000
heap
page read and write
C19C6FF000
stack
page read and write
19C48716000
heap
page read and write
26162704000
heap
page read and write
17CF8108000
heap
page read and write
19C48F85000
heap
page read and write
19C48F86000
heap
page read and write
17A90049000
heap
page read and write
19C48520000
trusted library allocation
page read and write
2883EC58000
heap
page read and write
2615CF02000
heap
page read and write
C19BBFA000
stack
page read and write
FB71A7E000
stack
page read and write
17CF802A000
heap
page read and write
1A34F357000
heap
page read and write
1A34F346000
heap
page read and write
19C48F8A000
heap
page read and write
17CF805F000
heap
page read and write
C19C3FB000
stack
page read and write
19C483C0000
heap
page read and write
19C4865B000
heap
page read and write
19C48FAA000
heap
page read and write
19C48F86000
heap
page read and write
19C48F8C000
heap
page read and write
1F06D902000
heap
page read and write
25AD9565000
heap
page read and write
17A8FE30000
heap
page read and write
19C48F92000
heap
page read and write
19C49403000
heap
page read and write
19C48E02000
heap
page read and write
2615CC60000
heap
page read and write
856EB1E000
stack
page read and write
790A0F7000
stack
page read and write
17A90013000
heap
page read and write
7909D7E000
stack
page read and write
261624B0000
trusted library allocation
page read and write
26162540000
trusted library allocation
page read and write
2FEAFE000
stack
page read and write
19C48F8C000
heap
page read and write
2615DF60000
trusted library section
page readonly
1F06D760000
heap
page read and write
1F06D856000
heap
page read and write
C19C27F000
stack
page read and write
2883ED13000
heap
page read and write
19C48F00000
heap
page read and write
26162960000
trusted library allocation
page read and write
2883EC5C000
heap
page read and write
17CF807A000
heap
page read and write
26162709000
heap
page read and write
19C48F8A000
heap
page read and write
2615CE8A000
heap
page read and write
2616271D000
heap
page read and write
19C48F88000
heap
page read and write
26162470000
trusted library allocation
page read and write
25ADA0B0000
trusted library allocation
page read and write
19C49402000
heap
page read and write
19C48F7E000
heap
page read and write
2615CE8E000
heap
page read and write
2615D700000
heap
page read and write
9DBB4FC000
stack
page read and write
26162360000
trusted library allocation
page read and write
9DBAFBA000
stack
page read and write
25AD92FA000
heap
page read and write
25AD9520000
trusted library allocation
page read and write
17CF803C000
heap
page read and write
261625D0000
trusted library allocation
page read and write
17CF806E000
heap
page read and write
19C48F9D000
heap
page read and write
C19C2FF000
stack
page read and write
2615CE27000
heap
page read and write
19C48702000
heap
page read and write
2615DF70000
trusted library section
page readonly
9DBB27F000
stack
page read and write
2615DF50000
trusted library section
page readonly
19C48629000
heap
page read and write
2615D759000
heap
page read and write
2615CE8C000
heap
page read and write
261624B0000
trusted library allocation
page read and write
2615CE70000
heap
page read and write
19C48F67000
heap
page read and write
17CF8102000
heap
page read and write
26162702000
heap
page read and write
19C4865E000
heap
page read and write
26162720000
heap
page read and write
19C49403000
heap
page read and write
19C48FA5000
heap
page read and write
2615DF40000
trusted library section
page readonly
19C48FB7000
heap
page read and write
19C48661000
heap
page read and write
19C486B6000
heap
page read and write
26162702000
heap
page read and write
19C48FA3000
heap
page read and write
19C48F9A000
heap
page read and write
1F27F5C000
stack
page read and write
25ADA2C0000
trusted library allocation
page read and write
19C48FAA000
heap
page read and write
1A34F2E0000
heap
page read and write
2615CE00000
heap
page read and write
2883EC5D000
heap
page read and write
19C48F88000
heap
page read and write
25AD9570000
trusted library allocation
page read and write
19C486C8000
heap
page read and write
26162580000
trusted library allocation
page read and write
823247F000
stack
page read and write
26162687000
heap
page read and write
17CF8086000
heap
page read and write
26162660000
heap
page read and write
19C48F24000
heap
page read and write
2883ED00000
heap
page read and write
2616262B000
heap
page read and write
17CF804D000
heap
page read and write
19C48F7E000
heap
page read and write
2615CC70000
heap
page read and write
2883E9A0000
heap
page read and write
7909CFE000
stack
page read and write
19C48F86000
heap
page read and write
2615DE40000
trusted library allocation
page read and write
17A90054000
heap
page read and write
17CF7E30000
heap
page read and write
26162474000
trusted library allocation
page read and write
19C48F88000
heap
page read and write
FB717AE000
stack
page read and write
2883ED08000
heap
page read and write
2615D901000
trusted library allocation
page read and write
8232379000
stack
page read and write
17A9007F000
heap
page read and write
19C48FB3000
heap
page read and write
2615D602000
heap
page read and write
856F2FF000
stack
page read and write
2883EC81000
heap
page read and write
2883EC5A000
heap
page read and write
25AD9230000
heap
page read and write
2615CE58000
heap
page read and write
19C486E2000
heap
page read and write
1F06D790000
trusted library allocation
page read and write
19C48F88000
heap
page read and write
19C486AB000
heap
page read and write
17A9002A000
heap
page read and write
2883EC13000
heap
page read and write
261625A0000
trusted library allocation
page read and write
856F1FE000
stack
page read and write
26162490000
trusted library allocation
page read and write
C19BCFB000
stack
page read and write
19C48708000
heap
page read and write
19C48FDA000
heap
page read and write
261625E0000
trusted library allocation
page read and write
261625D0000
remote allocation
page read and write
19C48F97000
heap
page read and write
2615CDD0000
trusted library allocation
page read and write
82322FF000
stack
page read and write
19C48F8C000
heap
page read and write
2FEEF8000
stack
page read and write
26162478000
trusted library allocation
page read and write
1F06D813000
heap
page read and write
19C48F8F000
heap
page read and write
2616265B000
heap
page read and write
17A9004C000
heap
page read and write
19C48F9D000
heap
page read and write
19C49402000
heap
page read and write
19C48713000
heap
page read and write
17A9009B000
heap
page read and write
19C48F8C000
heap
page read and write
19C485E0000
remote allocation
page read and write
19C48685000
heap
page read and write
9DBB2FE000
stack
page read and write
17A8FFA0000
trusted library allocation
page read and write
17A9004E000
heap
page read and write
C19BF7F000
stack
page read and write
2615CE76000
heap
page read and write
1A34F320000
heap
page read and write
1A34F346000
heap
page read and write
1F06D700000
heap
page read and write
82324F9000
stack
page read and write
2FEA7B000
stack
page read and write
2883EC8B000
heap
page read and write
C19BEFB000
stack
page read and write
2615CE13000
heap
page read and write
261626F8000
heap
page read and write
1A34F325000
heap
page read and write
26162570000
trusted library allocation
page read and write
261625D0000
remote allocation
page read and write
2FECF7000
stack
page read and write
25AD930E000
heap
page read and write
82323F9000
stack
page read and write
1A34F341000
heap
page read and write
2615D702000
heap
page read and write
17A8FEA0000
heap
page read and write
1F2847B000
stack
page read and write
26162709000
heap
page read and write
C19B69C000
stack
page read and write
2616271C000
heap
page read and write
17CF7E40000
heap
page read and write
2616261D000
heap
page read and write
2615D718000
heap
page read and write
2883EC29000
heap
page read and write
2615D600000
heap
page read and write
17CF8000000
heap
page read and write
26162900000
trusted library allocation
page read and write
2883ED02000
heap
page read and write
790A1FF000
stack
page read and write
19C48FB3000
heap
page read and write
2FE8FE000
stack
page read and write
2615D5E1000
trusted library allocation
page read and write
25ADA2D0000
heap
page readonly
856F0FB000
stack
page read and write
1A34F372000
heap
page read and write
19C48F55000
heap
page read and write
261624A0000
trusted library allocation
page read and write
2615D718000
heap
page read and write
1A34F375000
heap
page read and write
2615CE93000
heap
page read and write
856EA9B000
stack
page read and write
261625D0000
remote allocation
page read and write
19C48F86000
heap
page read and write
1A34F33B000
heap
page read and write
26162491000
trusted library allocation
page read and write
26162470000
trusted library allocation
page read and write
2615D759000
heap
page read and write
2883EC59000
heap
page read and write
19C48F88000
heap
page read and write
2616271D000
heap
page read and write
25AD9560000
heap
page read and write
19C49400000
heap
page read and write
19C48FAA000
heap
page read and write
19C48F99000
heap
page read and write
17CF8113000
heap
page read and write
19C49419000
heap
page read and write
1F284FE000
stack
page read and write
2883EA10000
heap
page read and write
19C48F78000
heap
page read and write
25AD9302000
heap
page read and write
1F06D6F0000
heap
page read and write
2615CE29000
heap
page read and write
19C48F86000
heap
page read and write
2FF078000
stack
page read and write
1F06D829000
heap
page read and write
8231FBC000
stack
page read and write
19C48FC4000
heap
page read and write
2615CEFC000
heap
page read and write
FB720FF000
stack
page read and write
FB71EFE000
stack
page read and write
19C49420000
heap
page read and write
25AD9480000
heap
page read and write
261626A0000
heap
page read and write
2FE87C000
stack
page read and write
17A90051000
heap
page read and write
261622D0000
trusted library allocation
page read and write
C19C1F9000
stack
page read and write
2615DF20000
trusted library section
page readonly
C19C0FF000
stack
page read and write
9DBB3FF000
stack
page read and write
1F287FF000
stack
page read and write
7909F7B000
stack
page read and write
19C48F86000
heap
page read and write
2FE97E000
stack
page read and write
26162590000
trusted library allocation
page read and write
19C48F8F000
heap
page read and write
19C48F8C000
heap
page read and write
19C48F88000
heap
page read and write
17CF802D000
heap
page read and write
1F2837C000
stack
page read and write
25ADA2F0000
trusted library allocation
page read and write
2615E2D0000
trusted library allocation
page read and write
19C48F8A000
heap
page read and write
19C49402000
heap
page read and write
1A34F354000
heap
page read and write
2883EB10000
trusted library allocation
page read and write
2615CDE0000
trusted library section
page read and write
2883EC3C000
heap
page read and write
17CF8100000
heap
page read and write
1F06E202000
trusted library allocation
page read and write
17A90108000
heap
page read and write
17CF8013000
heap
page read and write
1F06D913000
heap
page read and write
1F2827E000
stack
page read and write
261624B4000
trusted library allocation
page read and write
C19B79E000
stack
page read and write
19C48F7C000
heap
page read and write
26162600000
heap
page read and write
2615E2C3000
trusted library allocation
page read and write
2616271F000
heap
page read and write
19C48FA5000
heap
page read and write
1A34F1B0000
heap
page read and write
856EFFB000
stack
page read and write
19C49402000
heap
page read and write
1A34F375000
heap
page read and write
19C4867E000
heap
page read and write
2616263B000
heap
page read and write
2883EC00000
heap
page read and write
25AD9500000
trusted library allocation
page read and write
19C48613000
heap
page read and write
2883EC65000
heap
page read and write
19C49402000
heap
page read and write
FB71C7B000
stack
page read and write
261626E9000
heap
page read and write
C19BDFE000
stack
page read and write
1F06D874000
heap
page read and write
26162702000
heap
page read and write
19C48F9A000
heap
page read and write
26162648000
heap
page read and write
19C48F8C000
heap
page read and write
19C486AC000
heap
page read and write
19C48F86000
heap
page read and write
25AD9510000
trusted library allocation
page read and write
1F06D86F000
heap
page read and write
17A9003C000
heap
page read and write
26162310000
trusted library allocation
page read and write
19C48F86000
heap
page read and write
1A34F35E000
heap
page read and write
19C4863C000
heap
page read and write
2615DF30000
trusted library section
page readonly
2883EC61000
heap
page read and write
19C4867E000
heap
page read and write
26162719000
heap
page read and write
19C48F19000
heap
page read and write
2615CF13000
heap
page read and write
17A90100000
heap
page read and write
2FEDFF000
stack
page read and write
7909C7C000
stack
page read and write
790A2FF000
stack
page read and write
2615CCD0000
heap
page read and write
17A90047000
heap
page read and write
FB71DF7000
stack
page read and write
19C48663000
heap
page read and write
19C48600000
heap
page read and write
17A9007E000
heap
page read and write
19C48FB0000
heap
page read and write
19C48F99000
heap
page read and write
C19C4FA000
stack
page read and write
9DBB379000
stack
page read and write
There are 433 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://promogiveawayus.com/